Evaluating the Impact of AES-256 Encryption on Network Performance: An Analysis of Transfer Time, Latency and Throughput
DOI:
https://doi.org/10.5281/zenodo.14745473Keywords:
AES-256 Encryption, Cipher Text, Cryptography, Data Security, Latency, Network Performance, Packet Loss Throughput., AES-256 Encryption, Cipher Text, Cryptography, Data Security, Latency, Network Performance, Packet Loss, Throughput, AES (Advanced Encryption Standard), PT (Plain Text), CT (Cipher Text), FTP (File Transfer Protocol), WAN (Wide Area Network)Abstract
Background and objectives - The file size of plain text impedes network performance. This level of impairment should be used as the benchmark for evaluation of encryption algorithms. The objective of this study is primarily to compare the effects of plain text and AES-256 encryption on network performance. Additionally, it will determine the effect of the encryption on plain text data size and the relationship between data size and selected network performance metrics.
Materials and methods- Plain text and AES-256 encrypted text of various data sizes were categorized into two groups- small to medium data size (10-100MB) and very small data size (0.1-0.9MB). The percentage increase in file size caused by encryption was recorded for each data. They were serially transmitted through EVENG simulated network environment. Transfer time, latency, and throughput were determined. The results were further evaluated using comparison of means, Pearson and Spearman’s correlations, line graphs and scatter plots.
Results - The increases in file size after encryption varies from 0.031% at 0.1MB to 0.00003% at 100MB. Graph lines of the metrics against data size are predominantly coincident but differ in pattern between the two categories. Scatter plots and correlation coefficients show a significant (p<0.05) positive correlation between transfer time and data size of each text in both categories, latency in the 10-100MB but not in the 0.1-0.9MB categories (p>0.05), or throughput in general. Curiously, a significant (p<0.05) strong positive correlation exists between throughput and data size in the 0.1-0.5MB range. A throughput saturation value starts at 60 MB for plain text and at 30 MB for cipher text.
Conclusion- AES-256 encrypted text and plain text have similar effects on network performance probably because of the former’s negligible effect on data size. Data size positively correlates with transfer time. Similar correlation exists with latency only in the 10-100MB range but not in the 0.1-0.9 MB range and not with throughput. An early, but, transient correlation occurs between data size and throughput in the 0.1-0.9MB range.
Downloads
References
1. Keck, M., Gillani, S., Dermish, A., Grossman, J., & Ruhmann, F. (2022). The role of cybersecurity and data security in the digital economy. Retrieved from https://policyaccelerator.uncdf.org/policy-tools/brief-cybersecurity-digital-economy.
2. Statista. (2023). Cybercrime: Number of compromises and impacted individuals in US 2005-2022. Retrieved from https://www.statista.com.
3. IBM. (2022). Cost of a Data Breach. Retrieved from https://www.ibm.com.
4. Stefánsson, S. (2017). Private, but not secure: HTTPS is hiding cybercrime. Security Week. Retrieved from https://www.securityweek.com.
5. Wagner, L. (2021, September 8). What is Cryptography? A complete overview. Boot.dev. Retrieved from https://blog.boot.dev/cryptography/what-is-cryptography.
6. IBM. (2022). Cost of a Data Breach. Retrieved from https://www.ibm.com.
7. Semwal, P., & Sharma, M. K. (2017). Comparative study of different cryptographic algorithms for data security in cloud computing. 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA), 1-7. https://doi.org/10.1109/ICACCAF.2017.8344738.
8. Abood, O. G., & Guirguis, S. K. (2018). A survey on cryptography algorithms. International Journal of Scientific and Research Publications, 8(7). https://doi.org/10.29322/ijsrp.8.7.2018.p7978.
9. Hamouda, B. E. H. H. (2020). Comparative study of different cryptographic algorithms. Journal of Information Security, 11(3), 138–148. https://doi.org/10.4236/jis.2020.113009.
10. Saini, H. (n.d.). 8 strongest data encryption algorithms in cryptography. Analytics Steps. Retrieved from https://www.analyticssteps.com/blogs/8-strongest-data-encryption-algorithms-cryptography.
11. Hammad, B. T., Sagheer, A. M., Ahmed, I., & Jamil, N. (2020). A comparative review on symmetric and asymmetric DNA-based cryptography. Bulletin of Electrical Engineering and Informatics, 9(6), 2484–2491. https://doi.org/10.11591/eei.v9i6.2470.
12. Boulmalf, M., Barka, E., & Lakas, A. (2007). Analysis of the effect of security on data and voice traffic in WLAN. Computers and Communications, 30(11), 2468–2477. https://doi.org/10.1016/j.comcom.2007.04.024.
13. Turab, N., & Moldoveanu, F. (2008). The impact of various security mechanisms on the WLAN performance. Series C, 70(4), 21–36.
14. Kolahi, S. S., Li, P., Argawe, M., & Safdari, M. (2012). WPA2 security-bandwidth trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems. IEEE Symposium on Computers and Communications (ISCC). https://doi.org/10.1109/ISCC.2012.6249358.
15. Siwamogsatham, S., Hiranpruek, K., Luangingkasut, C., & Srilasak, S. (2008). Revisiting the impact of encryption on performance of IEEE 802.11 WLAN. IEEE Xplore. https://doi.org/10.1109/ECTICON.2008.4600451.
16. Lepaja, S., Maraj, A., Efendiu, I., & Berzati, S. (2018). The impact of the security mechanisms in the throughput of the WLAN networks. 7th Mediterranean Conference on Embedded Computing (MECO), 1–5. https://doi.org/10.1109/MECO.2018.8406067.
17. Forenbacher, I., Husnjak, S., Jovović, I., & Bobić, M. (2021). Throughput of an IEEE 802.11 wireless network in the presence of wireless audio transmission: A laboratory analysis. Sensors, 21(8), 2620. https://doi.org/10.3390/s21082620.
18. Asare, S., Yaokumah, W., Gyebi, E. B. B., & Abdulai, J. (2022). Evaluating the impact of cryptographic algorithms on network performance. International Journal of Cloud Applications and Computing, 12(1), 1–15. https://doi.org/10.4018/ijcac.309937.
19. SocSciStatistics. (n.d.). Social science statistics. Retrieved from https://www.socscistatistics.com.
20. Elbayoumy, A., & Shepherd, S. (2005, March). A high grade secure VoIP system: The tiny encryption algorithm. In Proceedings of 7th Annual International Symposium on Advanced Radio Technologies (pp. [page range]). Boulder, Colorado.
21. Abolade, O., Okandeji, A., Oke, A., Osifeko, M., & Oyedeji, A. (2021). Overhead effects of data encryption on TCP throughput across IPSEC secured network. Scientific African, 13, e00855. https://doi.org/10.1016/j.sciaf.2021.e00855.
22. Bianchi, G. (1998). IEEE 802.11-saturation throughput analysis. IEEE Communications Letters, 2(12), 318–320. https://doi.org/10.1109/49.740860.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research and Modern Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
PlumX Metrics takes 2–4 working days to display the details. As the paper receives citations, PlumX Metrics will update accordingly.